Security and Privacy in Digital Rights Management ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers /

The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on Nov...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sander, Tomas (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2320
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05278nam a2200625 4500
001 978-3-540-47870-6
003 DE-He213
005 20191027122417.0
007 cr nn 008mamaa
008 121227s2002 gw | s |||| 0|eng d
020 |a 9783540478706  |9 978-3-540-47870-6 
024 7 |a 10.1007/3-540-47870-1  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Security and Privacy in Digital Rights Management  |h [electronic resource] :  |b ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers /  |c edited by Tomas Sander. 
250 |a 1st ed. 2002. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2002. 
300 |a X, 250 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2320 
505 0 |a Renewability -- Discouraging Software Piracy Using Software Aging -- Fuzzy Hashing -- New Iterative Geometric Methods for Robust Perceptual Image Hashing -- Cryptographic Techniques, Fingerprinting -- On Crafty Pirates and Foxy Tracers -- Efficient State Updates for Key Management -- Collusion Secure q-ary Fingerprinting for Perceptual Content -- Privacy, Architectures -- Privacy Engineering for Digital Rights Management Systems -- Secure Open Systems for Protecting Privacy and Digital Services -- MPEG-4 IPMP Extensions -- Software Tamper Resistance -- Dynamic Self-Checking Techniques for Improved Tamper Resistance -- Protecting Software Code by Guards -- How to Manage Persistent State in DRM Systems -- Cryptanalysis -- A Cryptanalysis of the High-Bandwidth Digital Content Protection System -- Economics, Legal Aspects -- Implications of Digital Rights Management for Online Music - A Business Perspective -- From Copyright to Information Law - Implications of Digital Rights Management -- Taking the Copy Out of Copyright. 
520 |a The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer engineering. 
650 0 |a Computers. 
650 0 |a Law and legislation. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computers and civilization. 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Computer Engineering.  |0 http://scigraph.springernature.com/things/product-market-codes/I27000 
650 2 4 |a Legal Aspects of Computing.  |0 http://scigraph.springernature.com/things/product-market-codes/I24059 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Computers and Society.  |0 http://scigraph.springernature.com/things/product-market-codes/I24040 
700 1 |a Sander, Tomas.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540829805 
776 0 8 |i Printed edition:  |z 9783540436775 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2320 
856 4 0 |u https://doi.org/10.1007/3-540-47870-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)